Chapter 8: IT Service Management. Topics covered: 1.1 Roles of helpdesk support staff. 1.2 Different types of helpdesk support level
|
|
- Jonas Barber
- 5 years ago
- Views:
Transcription
1 1 Chapter 8: IT Service Management Topics covered: 1.1 Roles of helpdesk support staff 1.2 Different types of helpdesk support level 1.3 Role of Internet Service Provider (ISP) 1.4 Change request process 1.5 Asset and inventory management 1.6 System and network management 1.7 Change configuration management
2 2 Roles of helpdesk support staff Nowadays, an organisation usually has a IT Service Helpdesk. It acts as the single point of support for a company s critical IT infrastructure and also for end users hardware and software. It must be contactable on all possible communication mediums and provide end-toend responsibility of the calls till problems are resolved. Successful IT departments ensure : - they are good at solving problems - provide great customer service to their clients The role of the IT Helpdesk:: A means to report, manage and resolve problems identified by customers A marketing tool for IT department or business. Helpdesk support personnel need to be trained to provide excellent problem management and resolution skills, using the tools and technical training required, to do their job effectively and efficiently. Problem Management aims at providing the appropriate tools and procedures for Helpdesk personnel. The tools include: a) Telephony and ACD (Automatic Call Distributor), b) CTI (Computer Telephony Integration), c) Helpdesk Software (for problem and change management) and documented policies and procedures are just some of the most important areas that need to be implemented and adhered to. d) Customer Service Ensure all Helpdesk personnel have good customer service skills and have appropriate training in how to manage their customers: from efficient call handling, through escalation procedures for dealing with irate customers.
3 3 KEY DUTIES AND RESPONSIBILITIES of Helpdesk Personnel: Identifies, diagnoses, and resolves Level One problems for users of personal computer software and hardware, network, the Internet and communicates solutions to end-users. Provides one-on-one end-user problem resolution over the phone for Personal Computer (PC) software. Delivers, tags, sets up, and assists in the configuration of end-user PC desktop hardware, software and peripherals. Diagnoses and resolves end-user network or local printer problems, PC hardware problems and , Internet, dial-in, and local-area network access problems. Coordinates timely repair of PC computer equipment covered by third-party vendor maintenance agreements. Performs minor desktop hardware repair for PC computer equipment and peripherals that are not covered by third-party vendor maintenance agreements. Helps install local area network cabling systems and equipment such as network interface cards, hubs and switches. There are different types of helpdesk support level. In general there are 3 levels to a helpdesk support setup. This setup provides a way to monitor a fault reported by a customer. Support Level 1 Support Level 2 Support personnel here will try to resolve level 1 problem such as configuration, connection or user setup problem. If the level 1 helpdesk support personnel cannot resolve the problem, it will be immediately escalated to the next level (Level 2) support personnel for technical assistance and resolution. Support personnel will research, investigate and work towards resolution of the problem. Call Centre Service Personnel will get updates from level 2 staff and then contact the Customer and/or Users to provide the solution to the reported problem. The Call Centre Service Personnel shall monitor the case until it is closed. Alternatively, the level 2 support personnel may contact the Customer and/or Users directly to provide the appropriate solution. If the level 2 helpdesk support personnel cannot resolve the problem, it will be immediately escalated to the next level (Level 3) support personnel for technical assistance and resolution.
4 4 Support Level 3 Level 3 - Support personnel will be the field Technicians or Engineers that will pay a visit to the end users premises or in the cast of a corporate environment it will be the users of the machine or the system in the corporate office. They will work closely with either the level 1 or level 2 support personnel to provide end-to-end troubleshooting till the problem it resolved and the reported problem shall be classified as "Closed" upon the provision of a solution to the Customer and/or Users. Severity Level On top of the 3 levels, there is the severity level (system error or issues) that are normally defined in the service level agreement (SLA). It varies from Organization to Organization. Severity 1 (Immediate Attention) Severity 2 (Urgent) Severity 3 (Normal) Description of Problem The problem affects mission critical systems such that the Customer and/or the Users is unable to perform its business functions. The problem affects a particular process or system for which there are alternatives for bypassing the problem. Customer and/or User's use of the System is continuing but not stopped. The problem has minimal effect on the Customer and/or the Users' ability to perform its functions. For each reported problem, an appropriate severity level will be assigned. Selection is based on the impact caused by the system error or issues. The helpdesk personnel taking the call will inform the Customer and/or User of the level. For each severity level of the System error or issue, the helpdesk support personnel will begin work on the error. They will use reasonable commercial efforts to resolve reported problems within the following timeframes: Severity 1 (Immediate Attention) Severity 2 (Urgent) Timeframe (time period to solve problem) Within two (2) hours. If the problem cannot be resolved within the above time limits, the helpdesk personnel will work continuously until the problem is resolved or an acceptable workaround is achieved. Helpdesk personnel will update the Customer on the work progress every hour until problem resolution or an acceptable workaround is achieved. Within four (4) hours, If the problem cannot be resolved within the above time limits, the helpdesk personnel will work continuously until the problem is resolved or an acceptable workaround is achieved.
5 5 Severity 3 (Normal) Helpdesk personnel will update the Customer on the work progress every 2 hours until problem resolution or an acceptable workaround is achieved. Within one (1) working day. If the problem cannot be resolved within the above time limits, the helpdesk personnel will work continuously until the problem is resolved or an acceptable workaround is achieved. Helpdesk personnel will update the Customer on the work progress every 4 hours until problem resolution or an acceptable workaround is achieved. The response time shall start from the time, the problem is given the Unique Incident Number. This number indicates that the problem has been logged with the Call Centre, OR the Customer reports the problem to the Technical Assistance personnel. Role of Internet Service Provider (ISP) An Internet Service Provider (also known as an ISP or even as an IAP, internet access provider) is a firm that offers subscribers access to the internet. Eg, Singtel, Starhub, etc. These ISPs focus on DSL, Cable modem, wireless, and dedicated high-speed interconnects such as T1 or fibre optic service. They offer varying levels of service, coverage, as well as personal customer service that comes attached with it. An ISP is a complete package of services, which should be researched and considered before one is selected. For most users, the most important qualification is the speed of the connection. DSL is slow at 128 Kilobits per second. Some are as fast as 3000 Kilobits per second. Buyer has to decide what to use. Once decided upon, the buyer needs to research their alternatives, and determine the best solution for their budget and needs.
6 6 How an ISP Works An ISP can be either privately owned, i.e., by an individual, or they can be group owned, i.e., by a group of individuals/community. ISPs are classified based on the way in which they provide service to their customers. There are 5 types of ISPs: Dial-up DSL Cable/FiberOptic Wi-Fi Satellite All of them have varying speeds and their own pros and cons. There are various terms related to the Internet. a. Modem Every computer that connects to the Internet has to do so using a modem. Modem stands for 'modulator-demodulator'. It modulates the data received from the user PC and convert it into digital form and pass the information to the Internet service provider. The data that it receives from the Internet service provider is the form of digital signal, and so it demodulates the data back to the user PC. b. IP Address IP stands for Internet Protocol. Every computer that connects to the Internet is assigned an IP address by the ISP. c. DHCP A protocol is nothing but a set of rules that decides the process of doing a work. The dynamic host control (DHCP) protocol is used by the ISP to assign temporary addresses to any of its subscribers who intend to connect to the Internet. DHCP d. Backbone of ISP This is the point that connects your ISP to the Internet. The ISPs buy a particular range of bandwidth for the working of its backbone. It is through this bandwidth that information is sent or received. The ISP Data Centre The Internet service provider carries out its entire functioning at the data centre. The advanced data centres consist of various equipment. A pool of modems inside the data centre is used to connect every subscriber to the Internet. Once a modem in the pool receives the information, it connects the subscriber to the backbone which links it to the internet.
7 7 ISPs have large caches and transferring data to and from hundreds of computers at superfast speeds. Hence, it is very important to maintain ISPs properly and have the necessary equipment required to do so. Cooling devices and backup power supplies are among the important components used by an ISP to ensure its smooth operation. These components are of utmost importance for the effective functioning of the ISP. Change Request Process In a company, any stakeholder can submit a request to change any area in the company. Once a change request is received, it must go through the Change Request Process. Change Request (CR) A formally submitted request that is used to track all stakeholder requests along with related status information throughout the project lifecycle. Type of change can include new features, enhancement requests, defects, changed requirements, etc. All change history will be maintained with the Change Request, including all state changes along with dates and reasons for the change. This information will be available for any repeat reviews and for the final closing. Change (or Configuration) Control Board (CCB) This board of people oversees the change process. It consists of representatives from all interested parties, including customers, developers, and users. In a small project, a single team member, such as the project manager or software architect, may play this role.
8 8 CCB Review Meeting The function of this meeting is to review Submitted Change Requests to determine if a request is valid. If valid, the change checked if it is in or out of scope, based on priority, schedule, resources, level-of-effort, risk, severity and any other relevant criteria as determined by the group. This meeting is usually held once per week or as frequently as daily if volume increase. Members of the CCB Review Meeting are the - Test, - Development and - a member of the Marketing Department. Additional attendees may be deemed necessary by the members on an "as needed" basis. Change Request Submit Form This form is displayed when a Change Request is submitted for the first time. Only the fields necessary for the submitter to complete are displayed on the form. Change Request Combined Form This form is displayed when you are reviewing a Change Request that has already been submitted. It contains all the fields necessary to describe the Change Request. The following outline of the Change Request process describes the states and statuses of Change Requests through their overall process, and the people who need to be notified during the Lifecycle of the Change Request. Sample Change Request Management (CRM) Process Activity Descriptions: Activity Description Responsibility 1. Submit CR 2. Review CR Any stakeholder of the project can submit a Change Request (CR). The Change Request is logged into the Change Request Tracking System and is placed into the CCB Review Queue, by setting the Change Request State to Submitted. The function of this activity is to review Submitted Change Requests. An initial review of the contents of the Change Request is done in the CCB Review meeting to determine if it is a valid request. If so, then a determination is made if the change is in or out of scope for the current release(s), based on priority, schedule, resources, level-ofeffort, risk, severity and any other relevant criteria as determined by the Submitter CCB
9 9 3. Confirm Duplicate or Reject 4. Update CR 5. Assign & Schedule Work 6. Make Changes 7. Verify Changes in Test Build group. If a Change Request is suspected of being a Duplicate or Rejected as an invalid request (e.g., operator error, not reproducible, the way it works, etc.), a delegate of the CCB is assigned to confirm the duplicate or rejected Change Request and to gather more information from the submitter, if necessary. If more information is needed (More Info) to evaluate a Change Request, or if a Change Request is rejected at any point in the process (e.g., confirmed as a Duplicate, Rejected, etc.), the submitter is notified and may update the Change Request with new information. The updated Change Request is then resubmitted to the CCB Review Queue for consideration of the new data. Once a Change Request is Opened, the will then assign the work to the appropriate team member depending on the type of request (e.g., enhancement request, defect, documentation change, test defect, etc.) and make any needed updates to the project schedule. The assigned team member performs the set of activities defined within the appropriate section of the process (e.g., requirements, analysis & design, implementation, produces user-support materials, design test, etc.) to make the changes requested. These activities will include all normal review and unit test activities as described within the normal development process. The Change Request will then be marked as Resolved. After the changes are Resolved by the assigned team member (analyst, developer, tester, tech writer, etc.), the changes are placed into a test queue to be assigned to a tester and Verified in a CCB Delegate Submitter Assigned Team Member Tester
10 10 8. Verify Changes in Release Build test build of the product. Once the resolved changes have been Verified in a test build of the product, the Change Request is placed into a release queue to be verified against a release build of the product, produce release notes, etc. and Close the Change Request. /CCB Example with Sample Data: : Network Upgrade Change No. CR001 Change Type Design/ Scope CR002 Schedule CR003 Design/ Scope Description of Change This change request calls for replacing existing ABC network routers with NextGen 3000 routers. This change request calls for delaying the existing schedule by one week to ensure all applications are backed up which was not considered in the original project plan. This change request calls for modifying existing network firewalls to add intrusion detection systems to enhance network security. Requestor Change Log Date Date Submitted Approved Date: 24/05/20xx Status Comments Jelly Bean 15/04/xx N/A Denied This request was denied by the change control board because there is not adequate funding available for the purchase of new routers and because the request is outside of the project's scope. This request was approved to ensure the security and continuity of all applications. One week will be added C. 18/04/xx 14/05/xx Approved to the project Jonhson schedule and the project manager will communicate the impact of this change to all stakeholders. Chris Tom 20/04/xx N/A Deferred This request was deferred and is pending a determination of the impact of the project's costs, schedule and scope.
11 11 Sample Change Request Management (CRM) State Descriptions: State Definition Access Control Submitted Postponed Duplicate This state occurs as the result of 1) a new Change Request submission, 2) update of an existing Change Request or 3) consideration of a Postponed Change Request for a new release cycle. Change Request is placed in the CCB Review queue. No owner assignment takes place as a result of this action. Change Request is determined to be valid, but "out of scope" for the current release(s). Change Requests in the Postponed state will be held and reconsidered for future releases. A target release may be assigned to indicate the timeframe in which the Change Request may be Submitted to re-enter the CCB Review queue. A Change Request in this state is believed to be a duplicate of another Change Request that has already been submitted. Change Requests can be put into this state by the CCB Review or by the team member assigned to resolve it. When the Change Request is placed into the Duplicate state, the Change Request number it duplicates will be recorded. A submitter should initially query the Change Request database for duplicates of a Change Request before it is submitted. This will prevent several steps of the review process and therefore save a lot of time. Submitters of duplicate Change Requests should be added to the notification list of the original Change All Users QE Development
12 12 Rejected More Info Opened Request for future notifications regarding resolution. A Change Request in this state is determined by in the CCB Review Meeting or by the assigned team member to be an invalid request or more information is needed from the submitter. If already assigned (Open), the Change Request is removed from the resolution queue and will be reviewed again. A designated authority of the CCB is assigned to confirm. No action is required from the submitter unless deemed necessary, in which case the Change Request state will be changed to More Info. The Change Request will be reviewed again in the CCB Review Meeting considering any new information. If confirmed invalid, the Change Request will be Closed by the CCB and the submitter notified. Insufficient data exist to confirm the validity of a Reject or Duplicate Change Request. The owner automatically gets changed to the submitter who is notified to provide more data. A Change Request in this state has been determined to be "in scope" for the current release and is awaiting resolution. It has been slated for resolution before an upcoming target milestone. It is defined as being in the "assignment queue". The meeting members are the sole authority for opening a Change Request into the resolution queue. If a Change Request of priority two or higher is found, it should be brought to the immediate attention of the QE or Development. At that point they may decide to convene an emergency CCB Review Meeting or simply open the Change Request into the resolution queue instantly. Development Test Development QE Department
13 13 Assigned Resolved Test Failed Verified Closed An Opened Change Request is then the responsibility of the to Assign Work based on the type of Change Request and update the schedule, if appropriate. Signifies that the resolution of this Change Request is complete and is now ready for verification. If the submitter was a member of the QE Department, the owner automatically gets changed to the submitting QE member; otherwise, it changes to the QE for manual re-assignment. A Change Request that fails testing in either a test build or a release build will be placed in this state. The owner automatically gets changed to the team member who resolved the Change Request. A Change Request in this state has been Verified in a test build and is ready to be included in a release. Change Request no longer requires attention. This is the final state a Change Request can be assigned. Only the CCB Review has the authority to close a Change Request. When a Change Request is Closed, the submitter will receive an notification with the final disposition of the Change Request. A Change Request may be Closed: 1) after its Verified resolution is validated in a release build, 2) when its Reject state is confirmed, or 3) when it is confirmed as a Duplicate of an existing Change Request. In the latter case, the submitter will be informed of the duplicate Change Request and will be added to that Change Request for future notifications (see the definitions of states "Reject" Development QE Development Department QE Department QE Department
14 14 and "Duplicate" for more details). If the submitter wishes to contest a closing, the Change Request must be updated and re-submitted for CCB review.
Schema Change Request
Schema Change Request Document ID 1 Change Type Bug Fix or Enhancement or New Requirement Title MSATS functional enhancements Date 14 February, 2003 Prepared By Nada Reinprecht Priority Notes Last saved
More informationService Description: Advanced Services- Fixed Price: Cisco UCCE Branch Advise and Implement Services (ASF-CX-G-REBPB-CE)
Page 1 of 1 Service Description: Advanced Services- Fixed Price: Cisco UCCE Branch Advise and Implement Services (ASF-CX-G-REBPB-CE) This document describes Advanced Services Fixed Price: Cisco UCCE Branch
More informationANZSCO Descriptions The following list contains example descriptions of ICT units and employment duties for each nominated occupation ANZSCO code. And
ANZSCO Descriptions The following list contains example descriptions of ICT units and employment duties for each nominated occupation ANZSCO code. Content 261311 - Analyst Programmer... 2 135111 - Chief
More informationRequest for Proposal Technology Services, Maintenance and Support
Maintenance and Support April 26 th, 2018 Request for Proposal Technology Services, Maintenance and Support Celerity Schools Louisiana Inc. is seeking an IT consulting firm to manage Maintenance of our
More informationNetwork Infrastructure, Desktop, and Server Support Service Level Agreement
Network Infrastructure, Desktop, and Server Support Service Level Agreement INTRODUCTION This service level agreement ( SLA ) describes the core services provided to customers by Micro- Management Systems,
More informationManaged WAN SLA. Contents
Managed WAN SLA Contents Terminology... 2 Service Description... 2 General... 2 Levels and Offerings... 2 Private Network Services... 2 Features... 2 Internet Access... 3 Features... 3 Service Level Metrics...
More informationManaged WAN SLA. Contents
Managed WAN SLA Contents Terminology... 2 Service Description... 2 Service Offerings... 2 Private Network Services... 2 Ethernet Connectivity... 2 T-1 Connectivity... 3 Other Connectivity... 3 Internet
More informationClearswift Managed Security Service for
Clearswift Managed Security Service for Email Service Description Revision 1.0 Copyright Published by Clearswift Ltd. 1995 2019 Clearswift Ltd. All rights reserved. The materials contained herein are the
More informationSmartDesk Support Portal. Client Manual
SmartDesk Support Portal Client Manual Table of Contents INTRODUCTION TO SMARTDESK... 3 ACCOUNT SETUP... 4 LOGIN... 5 SUBMIT A TICKET IN SMARTDESK... 6 STATUS OF TICKETS... 9 PRIORITY OF TICKETS... 10
More informationService Level Agreement (SLA) for The Texas State University System Office
Service Level Agreement (SLA) for The Texas State University System Office By Technology Resources Texas State University San Marcos Effective Date: January 01, 2008 Version Version Date Revision / Description
More informationInternational Journal of Computer Science Trends and Technology (IJCS T) Volume 4 Issue 3, May - Jun 2016
RESEARCH ARTICLE Import Sourcing of Defect Life Cycle and Defect Management Process Dr V.Goutham Department of Computer Science and Engineering TKR Engineering College, JNTU Hyderabad Telangana - India
More informationNetwork Security Policy
Network Security Policy Date: January 2016 Policy Title Network Security Policy Policy Number: POL 030 Version 3.0 Policy Sponsor Policy Owner Committee Director of Business Support Head of ICU / ICT Business
More informationFACTORYTALK PRODUCTIONCENTRE SUPPORT POLICY GUIDEBOOK. Copyright 2007 Rockwell Automation, Inc. All rights reserved.
FACTORYTALK PRODUCTIONCENTRE SUPPORT POLICY GUIDEBOOK Copyright 2007 Rockwell Automation, Inc. All rights reserved. 2 Technical Support Programs Each of our Support Programs includes application, developer
More informationIT Service Level Agreement
The Glasgow School of Art IT Service Level Agreement September 2016 Policy Control Title IT Service Level Agreement Date Approved Sep 2016 Approving Bodies Executive Group Implementation Date September
More informationSUMMARY OF SERVICES PROVIDED
SUMMARY OF SERVICES PROVIDED Desktop Desktop Included Anti-Virus Software license for all PC s Anti-Spyware License for all PC s Automated managed distribution of monthly Windows updates Unlimited Remote
More informationSERVICE DESCRIPTION MANAGED BACKUP & RECOVERY
Contents Service Overview.... 3 Key Features... 3 Implementation... 4 Validation... 4 Implementation Process.... 4 Internal Kick-Off... 4 Customer Kick-Off... 5 Provisioning & Testing.... 5 Billing....
More informationTechnical Consultant. Job Title Technical Consultant. Department Service Department. Reporting to Service Manager
Technical Consultant Job Title Technical Consultant Department Service Department Reporting to Service Manager Our Company Wanstor is an IT Solutions Company celebrating their 16 th year in business. The
More informationBME CLEARING s Business Continuity Policy
BME CLEARING s Business Continuity Policy Contents 1. Introduction 1 2. General goals of the Continuity Policy 1 3. Scope of BME CLEARING s Business Continuity Policy 1 4. Recovery strategies 2 5. Distribution
More informationHARTREE CENTRE SERVICE NOW SELF- SERVICE PORTAL
HARTREE CENTRE SERVICE NOW SELF- SERVICE PORTAL User Guide Name Amendment Version Reviewed by. Approved by. Lisa Whimperley Initial document Peter Kane Peter Kane creation. 31/10/2017 The Hartree Centre
More informationService Description: Software Support
Page 1 of 1 Service Description: Software Support This document describes the service offers under Cisco Software Support. This includes Software Support Service (SWSS), Software Support Basic, Software
More informationQumu Support and Maintenance Service Agreement
Qumu and Maintenance Service I. Scope: A. Services: Qumu, Inc. ( QUMU ) will provide technical assistance, software maintenance and support services (collectively Services as described in section II below)
More informationAVEVA Standard Support Guidelines
AVEVA Standard Support Guidelines Issue 1 December 2012 Page 1 of 8 CONTENTS 1 Terminology... 3 2 AVEVA Support Service... 4 2.1 Service Locations... 4 2.2 Requesting Support... 4 2.3 Additional Chargeable
More informationJOB DESCRIPTION FOR SUPPORT STAFF
JOB DESCRIPTION FOR SUPPORT STAFF JOB TITLE: REPORTS TO: Systems Administrator Technical Services Manager PURPOSE OF THE JOB The System Administrator is responsible for the effective provisioning, installation
More informationSenior Technical Consultant
Senior Technical Consultant Department Service Department Reporting to Service Manager Our Company Wanstor is an IT Solutions Company celebrating their 16 th year in business. The company has grown year
More informationWAN/MPLS SLA Fault Reporting
WAN/MPLS SLA Fault Reporting How to report a fault to us Call: 0 550 - Option, Option 5 Email: fixedlinefaults@onecom.co.uk We ll need the below information to log your fault: Company name and your name
More informationTECHNOLOGY SUPPORT SERVICE LEVEL AGREEMENT
TECHNOLOGY SUPPORT SERVICE LEVEL AGREEMENT Statement of Intent The Information Technology Center (MVECA) and school district mutually agree that this Service Level Agreement (SLA) documents school technology
More informationXO Wide Area Network ( WAN ) Services IP Virtual Private Network Services Ethernet VPLS Services
1.0 PRODUCT AND SERVICES 1.1 Product Descriptions. XO Wide Area Network ( WAN ) Services IP Virtual Private Network Services Ethernet VPLS Services (a) XO IP VPN. XO IP VPN is a layer 3 data networking
More informationMagento Enterprise Edition Customer Support Guide
Magento Enterprise Edition Customer Support Guide April 2017 magento.com/support 2017 Magento, Inc. All rights reserved. Thank You for using Magento Enterprise Edition Customer support is a vital part
More informationIT MANAGER PERMANENT SALARY SCALE: P07 (R ) Ref:AgriS042/2019 Information Technology Manager. Reporting to. Information Technology (IT)
DESIGNATION Reporting to Division Office Location IT MANAGER PERMANENT SALARY SCALE: P07 (R806 593.00) Ref:AgriS042/2019 Information Technology Manager CEO Information Technology (IT) Head office JOB PURPOSE
More informationSymantec ServiceDesk 7.1 SP1 Implementation Guide
Symantec ServiceDesk 7.1 SP1 Implementation Guide Symantec ServiceDesk 7.1 SP1 Implementation Guide The software described in this book is furnished under a license agreement and may be used only in accordance
More information(Office 365) Service Level Expectation
Email SLE Service Overview... 2 Service Features... 2 Service Warranty... 3 Support Model... 3 Support Hours and Initial Response Times... 4 Support Request Resolution Targets... 5 Service Request Fulfillment
More informationMERAKI SERVICE DESCRIPTION
MERAKI SERVICE DESCRIPTION Document Control Purpose of this Document The purpose of this document is to provide clear guidance on what the Meraki service will deliver to the end client. Document Contributors
More informationSEC Appendix AG. Deleted: 0. Draft Version AG 1.1. Appendix AG. Incident Management Policy
Draft Version AG 1.1 Deleted: 0 Appendix AG Incident Management Policy 1 Definitions In this document, except where the context otherwise requires: Expressions defined in section A of the Code (Definitions
More informationThe Project Charter. Date of Issue Author Description. Revision Number. Version 0.9 October 27 th, 2014 Moe Yousof Initial Draft
The Project Charter Project Title: VDI Data Center Design and Build Project Sponsor: South Alberta Data Centers Inc. (SADC Inc.) Project Customer: The City of Calgary Project Manager: Moe Yousof Document
More informationTo use centralised systems for remote control of computers and deployment of software, system images and security updates.
JOB DESCRIPTION POST: First Line Support Desk Analyst GRADE: Support Staff Grade 2/3 RESPONSIBLE TO: KEY PURPOSE: IT Manager To work as part of the ilrc team to provide on-going proactive technical and
More informationSolution Pack. Managed Services Virtual Private Cloud Security Features Selections and Prerequisites
Solution Pack Managed Services Virtual Private Cloud Security Features Selections and Prerequisites Subject Governing Agreement DXC Services Requirements Agreement between DXC and Customer including DXC
More informationSchema Change Request ASWG Change Management Process Draft Version 0.2
Schema Change Request Document ID CR#6 Change Type Enhancement Title Date 7 October, 2003 Prepared By Anne Waller PRIORITY Notes Page 1 of 15 Document Control Version Date Author Summary of Change 0.1
More informationSenior Manager Information Technology (India) Duration of job
Role Profile Job Title Senior Manager Information Technology (India) Directorate or Region South Asia Department/Country Business Support Services, India Location of post Gurgaon Pay Band 6 / Grade G Assistant
More informationNexgen Australia. Service Level Agreement
Nexgen Australia Service Level Agreement V090218 1 P a g e Contents 1. Introduction 2. Definitions 3. Faults 3.1 Fault Reporting 3.2 Fault Management 3.3 Fault Priority Classification 3.4 Target Response
More informationDISASTER RECOVERY PRIMER
DISASTER RECOVERY PRIMER 1 Site Faliure Occurs Power Faliure / Virus Outbreak / ISP / Ransomware / Multiple Servers Sample Disaster Recovery Process Site Faliure Data Centre 1: Primary Data Centre Data
More informationSupport Policy and Service Level Commitment
Support Policy and Service Level Commitment This Support Policy and Service Level Commitment ( SLC ) is between ZIP Telecom Inc. ( ZIP ) and the Client ( Client ). This SLC describes the terms and conditions
More informationThe ITIL Foundation Examination
The ITIL Foundation Examination Sample Paper A, version 5.1 Multiple Choice Instructions 1. All 40 questions should be attempted. 2. All answers are to be marked on the answer grid provided. 3. You have
More informationCORPORATE GLOBAL ROAMING PRODUCT SPECIFICATION
CORPORATE GLOBAL ROAMING PRODUCT SPECIFICATION 1. INTRODUCTION This document contains information on the Corporate Global Roaming service. If you require more detailed technical information, please contact
More informationSymantec NetBackup Vault Operator's Guide
Symantec NetBackup Vault Operator's Guide UNIX, Windows, and Linux Release 7.6 Symantec NetBackup Vault Operator's Guide The software described in this book is furnished under a license agreement and may
More informationHPE Proactive 24 Service
Data sheet HPE Proactive 24 Service Support Services HPE Proactive 24 Service is an integrated hardware and software support solution that combines technical assistance with proactive account services
More informationWelcome to Hitachi Vantara Customer Support for Pentaho
Welcome to Hitachi Vantara Customer Support for Pentaho This page intentionally left blank. Contents Getting Started with the Customer Portal... 1 Knowledge Base for Pentaho... 2 Hitachi Vantara Technical
More informationAUTHORITY FOR ELECTRICITY REGULATION
SULTANATE OF OMAN AUTHORITY FOR ELECTRICITY REGULATION SCADA AND DCS CYBER SECURITY STANDARD FIRST EDITION AUGUST 2015 i Contents 1. Introduction... 1 2. Definitions... 1 3. Baseline Mandatory Requirements...
More informationSmart Business Portal User Guide Version: 1.3
Smart Business Portal User Guide Version: 1.3 Published on: 23 March 2012 ID 9030700 Table of Contents 1. Overview 3 1.1. Voice continuity services overview 3 1.1.1. Directed Recovery service 3 1.1.2.
More informationNetwork Services Enterprise Broadband
Contents 1. 2. ADSL/Broadband Provisions 3. Network Services Customer Responsibilities 4. Network Services General 5. Service Management Boundary 6. Defined Terms Network Services Where the Customer selects
More informationSERVICE DESCRIPTION DEDICATED SERVER
Contents Service Overview.... 3 Key Features... 3 Implementation... 4 Validation... 4 Implementation Process.... 4 Internal Kick-Off... 4 Customer Kick-Off... 5 Provisioning & Testing.... 5 Billing....
More informationMarine Institute Job Description
Marine Institute Job Description Position Contract Service Group Location Temporary Scientific and Technical Officer (STO) - IT Systems Administrator Temporary specified purpose contract for a duration
More informationService Description: Advanced Services Fixed Price Cisco WebEx Advise and Implement Service (0-5,000 Users) (ASF- WBXS-UC-PDIBSE)
Page 1 of 9 Service Description: Advanced Services Fixed Price Cisco WebEx Advise and Implement Service (0-5,000 Users) (ASF- WBXS-UC-PDIBSE) This document describes Advanced Services Fixed Price Cisco
More informationManager, Infrastructure Services. Position Number Community Division/Region Yellowknife Technology Service Centre
IDENTIFICATION Department Position Title Infrastructure Manager, Infrastructure Services Position Number Community Division/Region 32-11488 Yellowknife Technology Service Centre PURPOSE OF THE POSITION
More informationVeritas NetBackup Vault Operator's Guide
Veritas NetBackup Vault Operator's Guide UNIX, Windows, and Linux Release 8.1.1 Veritas NetBackup Vault Operator's Guide Last updated: 2018-09-19 Document version: NetBackup 8.1 Legal Notice Copyright
More informationA s c e r t i a S u p p o r t S e r v i c e s G u i d e
A s c e r t i a S u p p o r t S e r v i c e s G u i d e A S C E R T I A LTD J A N U A R Y 2 0 1 7 D O C U M E N T V E R S I O N - 5.1 Copyright Ascertia Ltd, 2017 Commercial-in-Confidence 1 Ascertia Support
More informationUH OFFICES OF FACILITIES, GROUNDS and CAMPUS OPERATIONS & MANAGEMENT in partnership with. OFFICE OF CAPITAL IMPROVEMENT University of Hawaii System
UH OFFICES OF FACILITIES, GROUNDS and CAMPUS OPERATIONS & MANAGEMENT in partnership with OFFICE OF CAPITAL IMPROVEMENT University of Hawaii System efacilities Online Work Request User Guide www.hawaii.edu/efacilities
More informationAcuant. Support Portal Guide
Acuant Support Portal Guide Last updated on - 04/12/2018 1 Contents INTRODUCTION... 3 NEW USER... 3 Acuant Support Portal Log-in Page... 3 Register New User... 4 EMAIL CONFIRMATION... 5 YOUR PROFILE...
More informationRequest for Proposal Retail Internet Service Providers for Open Access Network
Request for Proposal Retail Internet Service Providers for Open Access Network INTRODUCTION Mammoth Networks is pleased to present a Request for Proposal (RFP) for Internet Service Providers (ISPs) to
More informationAttachment C Service Level Agreement for WAN and Internet
Attachment C Service Level Agreement for WAN and Internet Overview The Vendor SLA for Owner shall apply to all data transmission and reception on all Vendor provided Owner Wide Area Network (WAN) connectivity,
More informationService Description: Identity Services Engine Implementation-Subscription Service
Page 1 of 6 Service Description: Identity Services Engine Implementation-Subscription Service Services Summary This document describes the Identity Services Engine Implementation. Subscription Service.
More informationA company built on security
Security How we handle security at Flywheel Flywheel was founded in 2012 on a mission to create an exceptional platform to help creatives do their best work. As the leading WordPress hosting provider for
More informationSOP Unplanned Outages/Major Incidents
Table of Contents Definitions... 2 Incident... 2 Declaring... 2 Incident Levels... 3 Priority 1... 3 Priority 2... 3 Priority 3... 3 Priority 4... 3 Mission Critical Services... 3 Authentication... 3 Computer
More informationStanddards of Service
Standards of Service for the Provision and Maintenance of; THUS Demon Business 2000, Business 8000, Business 2+, Business 2 + Pro, Demon Business Lite, Demon Business Lite +, Demon Business Unlimited,
More informationREQUEST FOR PROPOSAL INFORMATION TECHNOLOGY SUPPORT SERVICES
REQUEST FOR PROPOSAL INFORMATION TECHNOLOGY SUPPORT SERVICES I. INTRODUCTION Coastal Plain Area Economic Opportunity Authority, Inc. (hereinafter CPAEOA) is requesting proposals from qualified, professional
More informationPartner Premier Service Program
SERVICE DESCRIPTION Partner Premier Service Program Polycom s Partner Premier Service Program provides Service Partners with technical telephone support, advance parts replacement, software upgrades &
More informationGuidelines for Cisco IOS XR Software
Product Bulletin Guidelines for Cisco IOS XR Software PB478699 Introduction This document explains the Cisco IOS XR Software time-based release model and answers some common questions, such as linkage
More informationInformation Security Data Classification Procedure
Information Security Data Classification Procedure A. Procedure 1. Audience 1.1 All University staff, vendors, students, volunteers, and members of advisory and governing bodies, in all campuses and locations
More informationITSM20F_Umang. Number: ITSM20F Passing Score: 800 Time Limit: 120 min File Version: 4.0. Exin ITSM20F
ITSM20F_Umang Number: ITSM20F Passing Score: 800 Time Limit: 120 min File Version: 4.0 http://www.gratisexam.com/ Exin ITSM20F IT Service Management Foundation based on ISO/IEC 20000 (ITSM20F.EN) Version:
More informationEthernet DIA SLA Fault Reporting
Ethernet DIA SLA Fault Reporting How to report a fault to us Call: 0 550 - Option, Option Email: fixedlinefaults@onecom.co.uk We ll need the below information to log your fault: Company name and your name
More informationMarine Institute Job Description
Marine Institute Job Description Position Contract Service Group Location Temporary Systems Administrator Team Leader Temporary Specified Purpose contract for a duration of up to 3 years Ocean Science
More informationI. PURPOSE III. PROCEDURE
A.R. Number: 2.11 Effective Date: 2/1/2009 Page: 1 of 5 I. PURPOSE This policy outlines the procedures that third party organizations must follow when connecting to the City of Richmond (COR) networks
More information3.4 NON-DOMESTIC SERVICES (L )(C.2.1.9)
3.4 NON-DOMESTIC SERVICES (L.34.1.3.4)(C.2.1.9) Qwest uses a combination of owned assets and strategic international partners to deliver non-domestic services ensuring that providers with local knowledge
More informationConnect Broadband Fibre Residential
Connect Broadband Fibre Residential What is the Connect Broadband Fibre Residential product? Connect Broadband Fibre Residential is KCOM s white label reseller product that we make available to Communications
More informationChapter 16: Advanced Security
: Advanced Security IT Essentials: PC Hardware and Software v4.0 1 Purpose of this Presentation To provide to instructors an overview of : List of chapter objectives Overview of the chapter contents, including
More informationA CUSTOMER GUIDE TO THE SDL SUPPORT PORTAL SDL SUPPORT INCIDENT MANAGEMENT. Copyright Notice
SDL SUPPORT INCIDENT MANAGEMENT A CUSTOMER GUIDE TO THE SDL SUPPORT PORTAL Copyright Notice This document contains proprietary information, which is protected by copyright. All rights are reserved. No
More informationREQUEST FOR QUOTATION (RFQ) Provision of Internet Services for UN Women Indonesia Office
REQUEST FOR QUOTATION (RFQ) Provision of Internet Services for UN Women Indonesia Office Dear Sir / Madam: 1 May 2017 Ref: RFQ-2017-IDN-003 We are seeking the Internet Service Provider to provide Internet
More informationManaged NIDS Care Services
Managed NIDS Care Services This Service Guide ( SG ) sets forth a description of CenturyLink Managed NIDS Care Service ( Service ) offerings including technical details and additional requirements or terms,
More informationPOLICY 8200 NETWORK SECURITY
POLICY 8200 NETWORK SECURITY Policy Category: Information Technology Area of Administrative Responsibility: Information Technology Services Board of Trustees Approval Date: April 17, 2018 Effective Date:
More informationCOMCAST ENTERPRISE SERVICES PRODUCT-SPECIFIC ATTACHMENT SOFTWARE-DEFINED WIDE AREA NETWORKING (SD-WAN)
ATTACHMENT IDENTIFIER: SD-WAN, Ver. 1.0 COMCAST ENTERPRISE SERVICES PRODUCT-SPECIFIC ATTACHMENT SOFTWARE-DEFINED WIDE AREA NETWORKING (SD-WAN) The following additional terms and conditions are applicable
More informationMSA Enterprise 1. GENERAL TERMS AND CONDITIONS
1 1. GENERAL TERMS AND CONDITIONS Herein is given a list of technical support cases, in relation to which Kaspersky Lab will provide assistance to the owner of this Extended Technical Support Certificate
More informationReference Offer for Leased Line and Ethernet Services
Reference Offer for Leased Line and Ethernet Services Service Operations Manual Contents 1. Background... 2 2. Service Request Process... 2 2.1. Clean Order Process... 2 2.2. Order Delivery Process...
More informationIntroduction...4. Purpose...4 Scope...4 Manitoba ehealth Incident Management...4 Icons...4
Remedy Incident Management Version 3.2 Modified: 08/24/2017 TABLE OF CONTENTS Introduction...4 Purpose...4 Scope...4 Manitoba ehealth Incident Management...4 Icons...4 Incident Stages Overview...5 Identification
More informationTelephone System Service Level Agreement
Telephone System Service Level Agreement V1.0 The Complete Business Solution 04 0 Document Version Log 03 1 Purpose 03 2 Service Description 03 3 Service Availability 03 4 Scope of Service and Exclusion
More informationMatchPoint Support Services Description
MatchPoint Support Services Description 11.01.2018 CYCL AG Version 3.4 Disclaimer The complete content of this document is subject to the general terms and conditions of CYCL as of April 2011. The client
More informationSupport Services. Getting Started You must register your SonicWALL appliance at mysonicwall.com prior to requesting support.
Support Services Reference Guide In This Document www.mysonicwall.com Technical Resources Support and RMA Policy Contacting Support Service Level Agreement Escalation Customer Satisfaction mysonicwall.com
More informationVMware vcloud Air Accelerator Service
DATASHEET AT A GLANCE The VMware vcloud Air Accelerator Service assists customers with extending their private VMware vsphere environment to a VMware vcloud Air public cloud. This Accelerator Service engagement
More informationGigamon Service Offering Overview
Version 4 Purpose This document is a summary document of changes in August 2017 to Gigamon core support offerings and limited warranty support. More detailed information will be available in the Gigamon
More informationUser Guide Defect Manager for Web Table of Contents
Table of Contents... 1 Table of Contents... 1 Table of Figures... 2 About the... 4 Purpose of the System... 4 How the System Works Using Defect Manager for Web... 5 Issue Tracking Process... 5 Client Communications
More informationUH OFFICES OF FACILITIES, GROUNDS and CAMPUS OPERATIONS & MANAGEMENT in partnership with. OFFICE OF CAPITAL IMPROVEMENT University of Hawaii System
UH OFFICES OF FACILITIES, GROUNDS and CAMPUS OPERATIONS & MANAGEMENT in partnership with OFFICE OF CAPITAL IMPROVEMENT University of Hawaii System efacilities Online Work Request User Guide www.hawaii.edu/efacilities
More informationSiebel HelpDesk Guide. Siebel Innovation Pack 2013 Version 8.1/8.2 September 2013
Siebel HelpDesk Guide Siebel Innovation Pack 2013 Version 8.1/8.2 September 2013 Copyright 2005, 2013 Oracle and/or its affiliates. All rights reserved. This software and related documentation are provided
More informationFinancial Manager Change Request
The Financial Manager Change Request section of the Finance New FOP system replaces the current emailed requests to Finance Systems Management and the Budget Office. The Financial Manager Change Request
More informationClick the link and follow the simple instructions. Choose a password and you re all set!
Welcome to 501tech! Please keep a eye out for a email that will request that you verify your account. Below are screenshots of what that email will look like. You will need to finish the setup in order
More informationEX0-101_ITIL V3. Number: Passing Score: 800 Time Limit: 120 min File Version: 1.0. Exin EX0-101
EX0-101_ITIL V3 Number: 000-000 Passing Score: 800 Time Limit: 120 min File Version: 1.0 http://www.gratisexam.com/ Exin EX0-101 ITIL Foundation V 3.0 & ITIL Foundation Version: 8.0 Exin EX0-101 Exam Topic
More informationPretaGov Australia SaaS Hosting with Fully Managed Services, Support and Maintenance
PretaGov Australia SaaS Hosting with Fully Managed Services, Support and Maintenance Introduction to PretaGov PretaGov operates a Government Community Plone CMS (content management system) SaaS Cloud exclusively
More informationSecurity Architecture
Security Architecture RDX s top priority is to safeguard our customers sensitive information. Introduction RDX understands that our customers have turned over the keys to their sensitive data stores to
More informationCLOUD GOVERNANCE SPECIALIST Certification
CLOUD GOVERNANCE SPECIALIST Certification The Cloud Professional (CCP) program from Arcitura is dedicated to excellence in the fields of cloud computing technology, mechanisms, platforms, architecture,
More informationInsight s Remote Technical Assistance Center: A User s Guide to RTAC
Insight s Remote Technical Assistance Center: A User s Guide to RTAC Table of Contents 1. Remote Technical Assistance Center (RTAC) quick reference guide... 1 1.1 Opening a case with the RTAC 1.2 Online
More informationRegistration Data Incident Management Policy
Registration Data Incident Management Policy Author: DCC Operational Policy Draft Version 1 Date: 1 st May 2014 Page 1 of 23 Contents 1 Document History 4 1.1 Document Location 4 1.2 Review Dates 4 1.3
More informationAuthor: Janice M. Anderson Date: 5/1/2006
Subject: AHC-IS Desktop Policies, Proc and Standards Policy No. 3001 Applicable to: AHC-IS Pages: 6 Author: Janice M. Anderson Date: 5/1/2006 Replaces version Dated: 2005 POLICY: AHC-IS goals for Workstation
More informationCommunications Engineer (Fixed-Term) (Internal Only) Applications and Technologies Communications Team
Job escription Post/Job Title: Ref: Location including building: Faculty/Support Service: Group/Section: Normal hours per week: Communications ngineer (Fixed-Term) (Internal Only) ITS118/505408 University
More information